This document describes a module and method for authenticating data transfer between a storage device and a host device. The module is configured to allow encrypted data to be exchanged between the storage device and the host device once the module has verified that the storage device has been correctly paired with an authorized host device whereby the verification step does not require a password to be manually entered or an additional external device to be attached.
|
8. A method for authenticating data transfer between a storage device and a host device comprising:
generating, using a module, a digital signature for the storage device and the host device based on a unique number associated with the storage device and a unique device identity associated with the host device, wherein the unique number is provided within a secure crypto-processor in the storage device;
determining, using the module, if the digital signature has been written into a blockchain; allowing, using the module, encrypted data transfer between the storage device and the host device when it is determined that the digital signature matches a digital
signature written into the blockchain; or
preventing, using the module, data transfer between the storage device and the host device when it is determined that the digital signature does not match a digital signature written into the blockchain; receiving, using the module, from an authorized application provided in the host device, restricted logical block addresses (LBAs);
intercepting, using the module, instructions from the host device to access the restricted LBAs; and
allowing, using the module, the intercepted instructions to access to the restricted LBAs when the instructions have been validated by the module, wherein the instructions are signed by the authorized application using a public key of the storage device and are validated by the module using a private key of the storage device.
1. A module for authenticating data transfer between a storage device and a host device, the module comprising:
a processing unit; and
a non-transitory media readable by the processing unit, the media storing instructions that when executed by the processing unit cause the processing unit to:
generate a digital signature for the storage device and the host device based on a unique number associated with the storage device and a unique device identity associated with the host device, wherein the unique number is provided within a secure crypto-processor in the storage device;
determine if the digital signature has been written into a blockchain;
allow encrypted data transfer between the storage device and the host device when it is determined that the digital signature matches a digital signature written into the blockchain; or
prevent data transfer between the storage device and the host device when it is determined that the digital signature does not match a digital signature written into the blockchain;
receive, from an authorized application provided in the host device, restricted logical block addresses (LBAs);
intercept instructions from the host device to access the restricted LBAs; and
allow the intercepted instructions to access to the restricted LBAs when the instructions have been validated by the module, wherein the instructions are signed by the authorized application using a public key of the storage device and are validated by the module using a private key of the storage device.
2. The module according to
write the digital signature into the blockchain when a pairing instruction is received from an authorized application provided in the host device; and
allow encrypted data transfer between the storage device and the host device when the digital signature has been written into the blockchain.
3. The module according to
generate, after a random period of time has passed, another digital signature for the storage device and the host device based on the unique number associated with the storage device and the unique device identity associated with the host device;
determine if the another digital signature matches with the digital signature that has been written into the blockchain;
allow encrypted data transfer between the storage device and the host device when it is determined that the another digital signature matches the digital signature written into the blockchain; or
prevent data transfer between the storage device and the host device when it is determined that the another digital signature does not match the digital signature written into the blockchain.
4. The module according to
5. The module according to
encrypt, using public-key cryptography, the PGP session key;
store the encrypted PGP session key in secure locations at the storage device and the host device; and
encrypt all data exchanged between the storage device and the host device using the PGP session key.
6. The module according to
hash a combination of the unique number associated with the storage device and the unique device identity associated with the host device to generate a hashed message h;
converting, using a Boneh-Lynn-Shacham (BLS) signature scheme, the hashed message h into a BLS signature σ; and
using the BLS signature σ as the digital signature.
7. The module according to
9. The method according to
writing, using the module, the digital signature into the blockchain when a pairing instruction is received from an authorized application provided in the host device; and
allowing, using the module, encrypted data transfer between the storage device and the host device when the digital signature has been written into the blockchain.
10. The method according to
generating, using the module, after a random period of time has passed, another digital signature for the storage device and the host device based on the unique number associated with the storage device and the unique device identity associated with the host device;
determining, using the module, if the another digital signature matches with the digital signature that has been written into the blockchain;
allowing, using the module, encrypted data transfer between the storage device and the host device when it is determined that the another digital signature matches
the digital signature written into the blockchain; or
preventing, using the module, data transfer between the storage device and the host device when it is determined that the another digital signature does not match the digital signature written into the blockchain.
11. The method according to
12. The method according to
encrypting, using the module and using public-key cryptography, the PGP session key; storing, using the module, the encrypted PGP session key in secure locations at the storage device and the host device; and
encrypting, using the module, all data exchanged between the storage device and the host device using the PGP session key.
13. The method according to
hashing, using the module, a combination of the unique number associated with the storage device and the unique device identity associated with the host device to generate a hashed message h;
converting, using the module and using a Boneh-Lynn-Shacham (BLS) signature scheme, the hashed message h into a BLS signature σ; and
using the BLS signature σ as the digital signature.
14. The method according to
|
This invention relates to a module and method for authenticating data transfer between a storage device and a host device. The module is configured to allow encrypted data to be exchanged between the storage device and the host device once the module has verified that the storage device has been correctly paired with an authorized host device whereby the verification step does not require a password to be manually entered or an additional external device to be attached.
Storage devices typically comprise of solid state devices (SSDs), hard disk drives (HDDs), optical drives or a magnetic disc drives. Regardless whether the storage device comprises just-a-bunch-of-flash (JBOF), disk drives or SSDs, the host device is typically required to specify the logical block addresses (LBAs) and/or physical address blocks (PABs) that are to be accessed/modified in the storage device in order to access the information associated with the LBAs.
In order to gain access to content in a storage device, malicious third parties will typically connect the storage device to a host device and through the use of hacking algorithms or software, attempt to gain access to the information stored within the storage device. Typically, such storage devices would be protected at the software level, e.g. the operating system, through the use of usernames and passwords whereby a set of data contained within the storage device would be locked to a particular user and only the administrator of the software would have full access to all the data contained within the storage device.
However, when the administrator and/or the user keys in their password to gain access to the storage device, they will be vulnerable to man-in-the-middle type of attacks whereby their keystrokes and/or inputs may be recorded and transmitted to third parties. The malicious third party may then replay the commands thereby gaining access to the content of the storage device.
Instead of keying in passwords, those skilled in the art have proposed that an external security device, e.g. a USB drive, that contains the password (to allow the host device to access the storage device) be plugged into the host device and/or storage device each time the storage device is to be accessed. The relevant device will then automatically retrieve the password from the external device and use the password contained therein to gain access to the storage device.
Unfortunately, each time when the password is being utilized, it too will be vulnerable to man-in-the-middle types of attacks as malicious actors may monitor the transfer of data at the computer bus interfaces, e.g. Serial ATA/PCIe buses, and copy this information before the data is encrypted within the storage device and/or host device. The copied password may then be used to gain access to the content in the storage device.
For the above reasons, those skilled in the art are constantly striving to come up with a module and method that is capable of authenticating data transfer between a storage device and a host device without the need for passwords to be manually entered and/or without the need for external devices to be plugged in each time access to the storage device is required.
The above and other problems are solved and an advance in the art is made by systems and methods provided by embodiments in accordance with the invention.
A first advantage of embodiments of modules and methods in accordance with the invention is that the module is immune to man-in-the-middle type of attacks as passwords do not need to be entered and external security devices do not need to be plugged in each time the storage device is to be accessed.
A second advantage of embodiments of modules and methods in accordance with the invention is that the module is able to pair a storage device with a host device and once paired, only secure communication may take place between the storage device and the host device.
A third advantage of embodiments of modules and methods in accordance with the invention is that throughout the use of the paired device, the module will randomly carry out proof of possession checks to confirm that the storage device remains paired with the appropriate hardware.
A fourth advantage of embodiments of modules and methods in accordance with the invention is that once the storage device has been paired with a host hardware, this unique pairing will have to be maintained in order for data to be exchanged between the paired devices.
The above advantages are provided by embodiments of a module and/or method in accordance with the invention operating in the following manner.
According to a first aspect of the invention, a module for authenticating data transfer between a storage device and a host device is disclosed, the module comprising a processing unit; and a non-transitory media readable by the processing unit, the media storing instructions that when executed by the processing unit cause the processing unit to: generate a digital signature for the storage device and the host device based on a unique number associated with the storage device and a unique device identity associated with the host device; determine if the digital signature has been written into a blockchain; allow encrypted data transfer between the storage device and the host device when it is determined that the digital signature matches a digital signature written into the blockchain; or prevent data transfer between the storage device and the host device when it is determined that the digital signature does not match a digital signature written into the blockchain.
With regard to the first aspect of the invention, the instruction to prevent data transfer between the storage device and the host device further comprises instructions that when executed by the processing unit cause the processing unit to: write the digital signature into the blockchain when a pairing instruction is received from an authorized application provided in the host device; and allow encrypted data transfer between the storage device and the host device when the digital signature has been written into the blockchain.
With regard to the first aspect of the invention, the module further comprises instructions that when executed by the processing unit cause the processing unit to: generate, after a random period of time has passed, another digital signature for the storage device and the host device based on the unique number associated with the storage device and the unique device identity associated with the host device; determine if the another digital signature matches with the digital signature that has been written into the blockchain; allow encrypted data transfer between the storage device and the host device when it is determined that the another digital signature matches the digital signature written into the blockchain; or prevent data transfer between the storage device and the host device when it is determined that the another digital signature does not match the digital signature written into the blockchain.
With regard to the first aspect of the invention, the instructions to generate the digital signature comprises instructions for directing the processing unit to generate the digital signature based on a session key of a Pretty-Good-Privacy (PGP) hybrid cryptosystem.
With regard to the first aspect of the invention, the instructions to allow encrypted data transfer between the storage device and the host device comprises instructions for directing the processing unit to: encrypt, using public-key cryptography, the PGP session key; store the encrypted PGP session key in secure locations at the storage device and the host device; and encrypt all data exchanged between the storage device and the host device using the PGP session key.
With regard to the first aspect of the invention, the instructions to generate the digital signature comprises instructions for directing the processing unit to: hash a combination of the unique number associated with the storage device and the unique device identity associated with the host device to generate a hashed message h; converting, using a Boneh-Lynn-Shacham (BLS) signature scheme, the hashed message h into a BLS signature σ; and using the BLS signature a as the digital signature.
With regard to the first aspect of the invention, the module further comprises instructions that when executed by the processing unit cause the processing unit to: receive, from an authorized application provided in the host device, restricted logical block addresses (LBAs); intercept instructions from the host device to access the restricted LBAs; and allow the intercepted instructions to access to the restricted LBAs when the instructions have been validated by the module, wherein the instructions are signed by the authorized application using a public key of the storage device and are validated by the module using a private key of the storage device.
With regard to the first aspect of the invention, the unique number associated with the storage device is provided within a secure crypto-processor in the storage device.
With regard to the first aspect of the invention, the blockchain comprises a private distributed database system provided within the host device.
According to a second aspect of the invention, a method for authenticating data transfer between a storage device and a host device comprises the steps of: generating, using a module, a digital signature for the storage device and the host device based on a unique number associated with the storage device and a unique device identity associated with the host device; determining, using the module, if the digital signature has been written into a blockchain; allowing, using the module, encrypted data transfer between the storage device and the host device when it is determined that the digital signature matches a digital signature written into the blockchain; or preventing, using the module, data transfer between the storage device and the host device when it is determined that the digital signature does not match a digital signature written into the blockchain.
With regard to the second aspect of the invention, the step of preventing data transfer between the storage device and the host device further comprises the steps of: writing, using the module, the digital signature into the blockchain when a pairing instruction is received from an authorized application provided in the host device; and allowing, using the module, encrypted data transfer between the storage device and the host device when the digital signature has been written into the blockchain.
With regard to the second aspect of the invention, the method further comprises the steps of: generating, using the module, after a random period of time has passed, another digital signature for the storage device and the host device based on the unique number associated with the storage device and the unique device identity associated with the host device; determining, using the module, if the another digital signature matches with the digital signature that has been written into the blockchain; allowing, using the module, encrypted data transfer between the storage device and the host device when it is determined that the another digital signature matches the digital signature written into the blockchain; or preventing, using the module, data transfer between the storage device and the host device when it is determined that the another digital signature does not match the digital signature written into the blockchain.
With regard to the second aspect of the invention, the step of generating the digital signature comprises generating the digital signature based on a session key of a Pretty-Good-Privacy (PGP) hybrid cryptosystem.
With regard to the second aspect of the invention, the step of allowing encrypted data transfer between the storage device and the host device comprises the steps of: encrypting, using the module and using public-key cryptography, the PGP session key; storing, using the module, the encrypted PGP session key in secure locations at the storage device and the host device; and encrypting, using the module, all data exchanged between the storage device and the host device using the PGP session key.
With regard to the second aspect of the invention, the step of generating the digital signature comprises the steps of: hashing, using the module, a combination of the unique number associated with the storage device and the unique device identity associated with the host device to generate a hashed message h; converting, using the module and using a Boneh-Lynn-Shacham (BLS) signature scheme, the hashed message h into a BLS signature σ; and using the BLS signature σ as the digital signature.
With regard to the second aspect of the invention, the method further comprises the steps of: receiving, using the module, from an authorized application provided in the host device, restricted logical block addresses (LBAs); intercepting, using the module, instructions from the host device to access the restricted LBAs; and allowing, using the module, the intercepted instructions to access to the restricted LBAs when the instructions have been validated by the module, wherein the instructions are signed by the authorized application using a public key of the storage device and are validated by the module using a private key of the storage device.
With regard to the second aspect of the invention, wherein the unique number associated with the storage device is provided within a secure crypto-processor in the storage device.
With regard to the second aspect of the invention, wherein the blockchain comprises a private distributed database system provided within the host device.
The above and other problems are solved by features and advantages of a system and method in accordance with the present invention described in the detailed description and shown in the following drawings.
This invention relates to a module and method for authenticating data transfer between a storage device and a host device. The module is configured to allow encrypted data to be exchanged between the storage device and the host device once the module has verified that the storage device has been correctly paired with an authorized host device whereby the verification step does not require a password to be manually entered or an additional external device to be attached. If the module determines that the storage device and the host device are to be paired for the first time, the module will generate a digital signature based on unique identifiers of the storage device and the host device whereby this digital signature is then stored on a blockchain so that it may not be altered or changed.
The present invention will now be described in detail with reference to several embodiments thereof as illustrated in the accompanying drawings. In the following description, numerous specific features are set forth in order to provide a thorough understanding of the embodiments of the present invention. It will be apparent, however, to one skilled in the art, that embodiments may be realised without some or all of the specific features. Such embodiments should also fall within the scope of the current invention. Further, certain process steps and/or structures in the following may not been described in detail and the reader will be referred to a corresponding citation so as to not obscure the present invention unnecessarily.
Further, one skilled in the art will recognize that many functional units in this description have been labelled as modules throughout the specification. The person skilled in the art will also recognize that a module may be implemented as circuits, logic chips or any sort of discrete component. Still further, one skilled in the art will also recognize that a module may be implemented in software which may then be executed by a variety of processor architectures. In embodiments of the invention, a module may also comprise computer instructions, firmware or executable code that may instruct a computer processor to carry out a sequence of events based on instructions received. The choice of the implementation of the modules is left as a design choice to a person skilled in the art and does not limit the scope of this invention in any way.
An exemplary process or method for authenticating data transfer between a storage device and a host device in accordance with embodiments of the invention is set out in the steps below. The steps of the process or method as implemented by a module provided at the storage device and/or the host device are as follows:
Step 1: generate a digital signature for the storage device and the host device based on a serial number associated with the storage device and a unique device identity associated with the host device;
Step 2: determine if the digital signature has been written into a blockchain;
Step 3: allow encrypted data transfer between the storage device and the host device when it is determined that the digital signature matches a digital signature written into the blockchain; and
Step 4: prevent data transfer between the storage device and the host device when it is determined that the digital signature does not match a digital signature written into the blockchain.
In accordance with embodiments of the invention, the steps set out above may be carried out or executed by a module provided either at the host device and/or at the storage device.
A block diagram of a system for authenticating data transfer between a storage device and a host device in accordance with embodiments of the invention is illustrated in
As illustrated in
As illustrated in
Module 130 will also cause host device 152, which is preloaded with an operating system, to provide a unique device identifier and a public key associated with host device 152. In embodiments of the invention, the unique device identifier may be generated by an authorized application installed within an operating system of host device 152. This authorized application, which may comprise an embedded application, may also be used to generate a pairing instruction that is used to trigger the pairing of storage device 101 and host device 152.
As this is the first time that storage device 101 is to be paired with host device 152, when host device 152 provides its unique device identifier and the public key associated with host device 152, host device 152 will also provide the pairing instruction to module 130.
Upon receiving the required information from storage device 101 and host device 152, module 130 will initiate the pairing of these two devices by generating a digital signature for these two devices based on the serial number associated with storage device 101 and the unique device identifier associated with host device 152.
In an embodiment of the invention, the digital signature is generated as a session key for a Pretty-Good-Privacy (PGP) hybrid cryptographic algorithm. The unique digital signature is then subsequently written into blockchain 170. When required, a search may then be conducted on the blockchain to detect whether the unique digital signature has been written on to the blockchain.
In a further embodiment of the invention, the PGP session key may be treated as a message, m, which is then signed using a Boneh-Lynn-Shacham (BLS) signature scheme. In the BLS scheme, message m is hashed to produce hashed message, h. The BLS signature, σ, is then generated as σ=hx, where x comprises the private key of device 101 or 152 (e.g. the unique identifier of devices 101 and 152 respectively). This unique digital signature comprising the BLS signature, σ, is then subsequently written into blockchain 170. It should be noted that the BLS signature, σ, may be verified using the public BLS key of the device that was used to generate the BLS signature, e.g. the public key of device 101 or 152 respectively.
In a continuation of this embodiment of the invention, all subsequent data transfers that take place between storage device 101 and host device 152 will then be encrypted based on the PGP hybrid cryptosystem whereby each device's public keys will be used as each device's public PGP keys. In embodiments of the invention, the data transfer will typically be initiated by module 130 as module 130 has to provide the session key to the other device so that the other device may decrypt the cipher text and subsequently use the session key to generate the cipher text.
For example, when data is to be sent from storage device 101 to host device 152, whether through P2P methods of communications and/or conventional method of data transfer, module 130 will first encrypt the data using the session key to form cipher text. The session key is then encrypted using host device 152's public key. Module 130 then causes the public key-encrypted session key to be transmitted along with the cipher text to host device 152. Upon receiving the public key-encrypted session key and the cipher text, host device 152 then uses its own private key to recover the session key. The recovered session key is then used by host device 152 to decrypt the cipher text into conventional text. The recovery of the session key and the decryption of the cipher text may all take place within a secure location provided within host device 152.
As host device 152 now has in its possession the session key and as the public key of storage device 101 is known to host device 152, when data is to be sent from host device 152 to storage device 101, host device 152 will first encrypt the received data using the session key to form cipher text. The session key is then encrypted using storage device 101's public key. Host device 152 then causes the public key-encrypted session key to be transmitted along with the cipher text to storage device 101 where it is intercepted by module 130. Upon receiving the public key-encrypted session key and the cipher text, module 130 then uses storage device 101's private key to recover the session key. In other embodiments of the invention, as the session key is already stored within module 130, module 130 may use the existing session key to directly decrypt the cipher text into conventional text without having to decrypt the public key-encrypted session key first. The decrypted text is then forwarded onto storage device 101 for further processing.
For completeness, in another example, module 130 is provided within host device 152. As such, when data is to be sent from host device 152 to storage device 101, module 130 will first encrypt the data using the session key to form cipher text. The session key is then encrypted using storage device 101's public key. Module 130 then causes the public key-encrypted session key to be transmitted along with the cipher text to storage device 101. Upon receiving the public key-encrypted session key and the cipher text, storage device 101 then uses its own private key to recover the session key. The recovered session key is then used by storage device 101 to decrypt the cipher text into conventional text. The recovery of the session key and the decryption of the cipher text may all take place within a secure location (such as crypto-memory 102) provided within storage device 101.
As storage device 101 now has in its possession the session key and as the public key of host device 152 is known to storage device 101, when data is to be sent from storage device 101 to host device 152, storage device 101 will first encrypt the received data using the session key to form cipher text. The session key is then encrypted using host device 152's public key. Storage device 101 then causes the public key-encrypted session key to be transmitted along with the cipher text to host device 152 where it is intercepted by module 130. Upon receiving the public key-encrypted session key and the cipher text, module 130 then uses host device 152's private key to recover the session key. In other embodiments of the invention, as the session key is already stored within module 130, module 130 may use the existing session key to directly decrypt the cipher text into conventional text without having to decrypt the public key-encrypted session key first. The decrypted text is then forwarded onto host device 152 for further processing.
In another embodiment of the invention, the digital signature is generated as a Boneh-Lynn-Shacham (BLS) signature based on the BLS cryptographic signature scheme whereby the serial number associated with storage device 101 is used as the private key of device 101 while the unique device identifier associated with host device 152 is used as the private key of device 152. In this embodiment, the message, m, to be signed using the BLS signature scheme may comprise, but is not limited to, a combination of the private keys of devices 101 and 152 or a hash of the private key of device 101 with the private key of device 152, to produce hashed message, h. The BLS signature, σ, is then generated as σ=hx, where x comprises the private key of device 101 or 152. This unique digital signature comprising the BLS signature, σ, is then subsequently written into blockchain 170. It should be noted that the BLS signature, σ, may be verified using the public BLS key of the device that was used to generate the BLS signature, e.g. the public key of device 101 or 152 respectively.
All subsequent data transfers that take place between storage device 101 and host device 152 will then be encrypted based on existing cryptographic algorithms such as the PGP hybrid cryptosystem, symmetric encryption schemes and/or asymmetric encryption schemes and/or may be signed using the BLS signature scheme.
In a further embodiment of the invention, module 130 may, after a random and/or pre-determined period of time has passed, generate another digital signature (based on either of the embodiments above) for storage device 101 and host device 152 based on the serial number associated with storage device 101 and the unique device identifier associated with host device 152. Module 130 will then perform a check on the blockchain to determine if the newly generated digital signature may be found on the blockchain. If a match is found, this would imply that the two devices have been paired before and as such, encrypted data exchange may still take place between these two devices. Conversely, if a match is not found, this all data transfers between the two devices would then be halted.
In yet another embodiment of the invention, the digital signature may be generated using any cryptographic scheme such as, but is not limited to, asymmetric cryptography, symmetric cryptography, signing algorithms, key generation algorithms, signature verifying algorithms, digital signature schemes and/or any combination of these schemes.
With reference to
Flash array 104 may comprise any type of electronic non-volatile computer memory storage medium that can be electronically erased and reprogrammed such as NAND or NOR flash memories. Interface bus 114 acts as the physical interface between a host device and storage device 101 whereby existing storage standards and interfaces such as, but not limited to, small computer system interface (SCSI) protocol, serial advanced technology attachment (SATA) protocol, serial attached SCSI (SAS), Non-Volatile Memory express (NVMe), Peripheral Component Interconnect express (PCIe), NVMe over Fabric (NVME-oF), Network attached Storage (NAS) protocol or any similar interface may be used as the link for communicatively connecting storage device 101 to a host device such as a computer.
SIP 106 is a complex embedded system with standalone processing and works with firmware and modules contained within SIP 106 to manage all aspects of storage device 101, including protecting and controlling content stored in flash array 104, RAM 108 and secure crypto-processor/memory 102. This controller is most commonly implemented as a SoC (System-On-Chip) design which consists of multiple hardware-accelerated functional blocks/modules that are coupled to one or more embedded processor cores.
Secure crypto-processor/memory 102 comprises a dedicated chip/microprocessor for carrying out cryptographic operations and is usually embedded within tamper resistance packaging. Its main function is to act as the keystone of a security subsystem and it only outputs encrypted data once the external environment has been secured and established. PMIC 110 comprises a power management chipset which obtains its power directly from the host device's power source. As such, it can be said that storage device 101 will only be “powered on” once storage device 101 has been connected to a host device.
One skilled in the art will recognize that the various memory components described above comprise non-transitory computer-readable media and shall be taken to comprise all computer-readable media except for a transitory, propagating signal. Typically, the instructions are stored as program code in the memory components but can also be hardwired.
The detailed workings of blockchain 170 are omitted for brevity as it is known to one skilled in the art. In embodiments of the invention, blockchain 170 may comprise a decentralized distributed database system in which all nodes of the blockchain network are anonymous and all participate in the maintenance of the blockchain. In other embodiments of the invention, blockchain 170 may comprise a private distributed database system that is provided within any one of host devices 152, 154, server rack 156 and/or NaS 158.
In accordance with embodiments of the invention, a block diagram representative of components of processing system 200 that may be provided within host devices 152, 154, server rack 156, NaS 158 and/or any computing device/human interface device with an operating system for implementing embodiments in accordance with embodiments of the invention is illustrated in
In embodiments of the invention, each of the human interface devices, host devices 152, 154, server rack 156 and/or NaS 158 may comprise controller 201 and user interface 202. User interface 202 is arranged to enable manual interactions between a user and each of these modules as required and for this purpose includes the input/output components required for the user to enter instructions to provide updates to each of these modules. A person skilled in the art will recognize that components of user interface 202 may vary from embodiment to embodiment but will typically include one or more of display 240, keyboard 235 and track-pad 236.
Controller 201 is in data communication with user interface 202 via bus 215 and includes memory 220, processor 205 mounted on a circuit board that processes instructions and data for performing the method of this embodiment, an operating system 206, an input/output (I/O) interface 230 for communicating with user interface 202 and a communications interface, in this embodiment in the form of a network card 250. Network card 250 may, for example, be utilized to send data from these modules via a wired or wireless network to other processing devices or to receive data via the wired or wireless network. Wireless networks that may be utilized by network card 250 include, but are not limited to, Wireless-Fidelity (Wi-Fi), Bluetooth, Near Field Communication (NFC), cellular networks, satellite networks, telecommunication networks, Wide Area Networks (WAN) and etc.
Memory 220 and operating system 206 are in data communication with CPU 205 via bus 210. The memory components include both volatile and non-volatile memory and more than one of each type of memory, including Random Access Memory (RAM) 220, Read Only Memory (ROM) 225 and Just-a-bunch-of-flash (JBOF) 245, the last comprising one or more solid-state drives (SSDs). Memory 220 also includes secure flash 246 for securely storing secret keys, or private keys. One skilled in the art will recognize that the memory components described above comprise non-transitory computer-readable media and shall be taken to comprise all computer-readable media except for a transitory, propagating signal. Typically, the instructions are stored as program code in the memory components but can also be hardwired. Memory 220 may include a kernel and/or programming modules such as a software application that may be stored in either volatile or non-volatile memory.
Herein the term “processor” is used to refer generically to any device or component that can process such instructions and may include: a microprocessor, microcontroller, programmable logic device, system on chip (SOC), field-programmable gate array (FPGA), SOC+FPGA, Application-Specific Integrated Circuit (ASIC) or other computational device. That is, processor 205 may be provided by any suitable logic circuitry for receiving inputs, processing them in accordance with instructions stored in memory and generating outputs (for example to the memory components or on display 240). In this embodiment, processor 205 may be a single core or multi-core processor with memory addressable space. In one example, processor 205 may be multi-core, comprising—for example—an 8 core CPU. In another example, it could be a cluster of CPU cores operating in parallel to accelerate computations.
A user of host device 152 may then utilize an application programming interface (API) 404 of authorized application 402 to select a list of LBAs that re to be restricted. Depending on the type of OS 406 running on host device 152, an appropriate driver will be selected from low level driver 408 and will be used to communicate the list of restricted LBAs through communication bus 410 to storage device 101.
Upon receiving this list of restricted LBAs, module 130 will then provide the list to front end dispatcher 412. Front end dispatcher 412 will parse the list and assign tag numbers to each of the restricted LBAs. RAM code 414 then retrieves information about the tag numbers to determine if the LBA has been placed in a protected area and if it is meant to be moved into a protected area, RAM code 414 will then move the LBA into a protected area whereby it may only be access by validated instructions from the host device. RAM code 414 then updates all block stripes, and system tables (including the flash translation layer for SSDs), to migrate the restricted LBA's to a protected area, whereby all block stripes relating to these data files will be marked using one byte table. RAM code 414 does all this with the help of back end dispatcher 416, firmware 418, HAL 420, controller 422 and flash driver BUS 424.
Once this is done, the list of restricted LBAs are then provided to module 130. Module 130 is then configured to intercept any instructions from host device 152 to access the restricted LBAs. Module 130 will then only allow the intercepted instructions to access to the restricted LBAs when the instructions have been validated by module 130. In embodiments of the invention, the instructions will be validated when it is determined that the instructions were signed by the authorized application using a public key of the storage device and are validated by the module using a private key of the storage device.
Process 500 begins at step 502 whereby process 500 will generate a digital signature based on a unique serial number associated with the storage device and a unique device identifier associated with the host device. The generation of the digital signature at this step is as described in the previous sections above. At step 504, process 500 then uploads the digital signature into the blockchain. Process 500 then checks at step 506 whether the digital signature is found in a blockchain. If process 500 determines that the digital signature is found in the blockchain, it will proceed to allow all encrypted/bounded data transfers to take place between the storage device and the host device at step 508. Conversely, it will proceed to step 510 if process 500 determines that the digital signature is not found in the blockchain. At this step, allow all data transfers will not be allowed to take place between the storage device and the host device.
Numerous other changes, substitutions, variations and modifications may be ascertained by the skilled in the art and it is intended that the present invention encompass all such changes, substitutions, variations and modifications as falling within the scope of the appended claims.
Bouguerra, Nizar, Ling, Chan Mei
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7255270, | Jul 12 2004 | Samsung Electronics Co., Ltd. | Method and apparatus for searching rights objects stored in portable storage device using object location data |
7284082, | Aug 19 2004 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | Controller apparatus and method for improved data transfer |
8762789, | Sep 23 2009 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Processing diagnostic requests for direct block access storage devices |
8812860, | Dec 03 2010 | GEN DIGITAL INC | Systems and methods for protecting data stored on removable storage devices by requiring external user authentication |
9270683, | May 15 2009 | Amazon Technologies, Inc. | Storage device authentication |
9948467, | Dec 21 2015 | MasterCard International Incorporated | Method and system for blockchain variant using digital signatures |
20030196080, | |||
20050268328, | |||
20110107105, | |||
20170264600, | |||
20180309581, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Dec 21 2021 | LING, CHAN MEI | FLEXXON PTE LTD | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 058649 | /0677 | |
Dec 21 2021 | BOUGUERRA, NIZAR | FLEXXON PTE LTD | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 058649 | /0677 | |
Jan 13 2022 | Flexxon PTE. LTD. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jan 13 2022 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Jan 24 2022 | SMAL: Entity status set to Small. |
Date | Maintenance Schedule |
Mar 21 2026 | 4 years fee payment window open |
Sep 21 2026 | 6 months grace period start (w surcharge) |
Mar 21 2027 | patent expiry (for year 4) |
Mar 21 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Mar 21 2030 | 8 years fee payment window open |
Sep 21 2030 | 6 months grace period start (w surcharge) |
Mar 21 2031 | patent expiry (for year 8) |
Mar 21 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Mar 21 2034 | 12 years fee payment window open |
Sep 21 2034 | 6 months grace period start (w surcharge) |
Mar 21 2035 | patent expiry (for year 12) |
Mar 21 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |